About your Search

20130416
20130424
Search Results 0 to 4 of about 5
how to connect our technology, people and ideas and figure out how to cooperate and most importantly make a commitment to prevent these deaths from happening. 10 years ago there was a young woman named lenora alexander, she was a healthy 11-year-old irl and she underwent elective surgery to correct something at a prestigious hospital. the awoke at 2:00 a.m., victim of respiratory arrest, caused by a drug that was intended to ease her pain. but if she had been monitored continuously after the surgery, hospital staff and lenora may have been alerted and leah would probably have been rescued. but there are other sort of preventable deaths that deals with washing hands, transferring of infections when hands aren't washed properly. monitoring has already picked up by lenora's tragic situation. her situation is not unique, unfortunately. a summit came together to figure out what can we do to solve the problem going back to the coordination, cooperation that i spoke about earlier. the fact is at this patient safety, technology and science summit, people, trained professionals came togethe
the impacts of extreme weather events, clean energy technologies and the threats of rising temperatures across the country. in contrast, we are not aware of any republican member who has spoken on the house floor about the dangers of climate change and the committee of jurisdiction is not even willing to hold a hearing to hear what the scientists and experts have to say about the issue. i have a message to house republicans, you can't make climate change go away by ignoring the problem. . . . the speaker pro tempore: for what purpose does the gentlewoman from washington rise? mrs. mcmorris rodgers: to address the house for one minute and to revise and extend my remarks. the speaker pro tempore: without objection. mrs. mcmorris rodgers: thank you, madam speaker. today, our hearts remain heavy -- our hearts are heavy for those who lost their lives on monday's unspeakable act of violence. for those who remain in critical condition, for the parents who lost their 8-year-old son, and for the families whose loved ones never came home from the boston marathon. while our sorrow is great, so, too, is o
allocations and potentially alternative technologies that might augment oral replace ship assets we can really trace from the specificics observation that needs to be made to whatever mixture of ways to make it. maybe available to us and provide the best balanced approach to fulfilling those needs. that's called -- we've called that our fleet composition plan. it's been buttoned up in the last couple of weeks. we look forward to discuss that with you in the months ahead. that will be one underpinning. secondly, we have a fleet allocation and planning process that is headed by the head of complete rps with a and participation with the mission and science managers. it is in that form that we trace the available ship capabilities, the equipment of the vessels by priority by priority. >> admiral, i had a question. i don't mean to inject you in another controversial issue, but -- >> what the heck? >> what the heck, we're here anyway. border security, particularly the southern border. as many of us who live in areas where there's water understand, and particularly the entire coastal region is poten
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
Search Results 0 to 4 of about 5